| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 // | |
| 5 // Implementation of the ThreatDetails class. | |
| 6 | |
| 7 #include "chrome/browser/safe_browsing/threat_details.h" | |
| 8 | |
| 9 #include <stdint.h> | |
| 10 | |
| 11 #include "base/bind.h" | |
| 12 #include "base/lazy_instance.h" | |
| 13 #include "base/md5.h" | |
| 14 #include "base/strings/string_util.h" | |
| 15 #include "chrome/browser/safe_browsing/threat_details_cache.h" | |
| 16 #include "components/data_use_measurement/core/data_use_user_data.h" | |
| 17 #include "content/public/browser/browser_thread.h" | |
| 18 #include "net/base/host_port_pair.h" | |
| 19 #include "net/base/load_flags.h" | |
| 20 #include "net/base/net_errors.h" | |
| 21 #include "net/http/http_response_headers.h" | |
| 22 #include "net/traffic_annotation/network_traffic_annotation.h" | |
| 23 #include "net/url_request/url_fetcher.h" | |
| 24 #include "net/url_request/url_request_context_getter.h" | |
| 25 #include "net/url_request/url_request_status.h" | |
| 26 | |
| 27 using content::BrowserThread; | |
| 28 | |
| 29 // Only send small files for now, a better strategy would use the size | |
| 30 // of the whole report and the user's bandwidth. | |
| 31 static const uint32_t kMaxBodySizeBytes = 1024; | |
| 32 | |
| 33 namespace safe_browsing { | |
| 34 | |
| 35 ThreatDetailsCacheCollector::ThreatDetailsCacheCollector() | |
| 36 : resources_(NULL), result_(NULL), has_started_(false) {} | |
| 37 | |
| 38 void ThreatDetailsCacheCollector::StartCacheCollection( | |
| 39 net::URLRequestContextGetter* request_context_getter, | |
| 40 ResourceMap* resources, | |
| 41 bool* result, | |
| 42 const base::Closure& callback) { | |
| 43 // Start the data collection from the HTTP cache. We use a URLFetcher | |
| 44 // and set the right flags so we only hit the cache. | |
| 45 DVLOG(1) << "Getting cache data for all urls..."; | |
| 46 request_context_getter_ = request_context_getter; | |
| 47 resources_ = resources; | |
| 48 resources_it_ = resources_->begin(); | |
| 49 result_ = result; | |
| 50 callback_ = callback; | |
| 51 has_started_ = true; | |
| 52 | |
| 53 // Post a task in the message loop, so the callers don't need to | |
| 54 // check if we call their callback immediately. | |
| 55 BrowserThread::PostTask( | |
| 56 BrowserThread::IO, FROM_HERE, | |
| 57 base::BindOnce(&ThreatDetailsCacheCollector::OpenEntry, this)); | |
| 58 } | |
| 59 | |
| 60 bool ThreatDetailsCacheCollector::HasStarted() { | |
| 61 DCHECK_CURRENTLY_ON(BrowserThread::IO); | |
| 62 return has_started_; | |
| 63 } | |
| 64 | |
| 65 ThreatDetailsCacheCollector::~ThreatDetailsCacheCollector() {} | |
| 66 | |
| 67 // Fetch a URL and advance to the next one when done. | |
| 68 void ThreatDetailsCacheCollector::OpenEntry() { | |
| 69 DCHECK_CURRENTLY_ON(BrowserThread::IO); | |
| 70 DVLOG(1) << "OpenEntry"; | |
| 71 | |
| 72 if (resources_it_ == resources_->end()) { | |
| 73 AllDone(true); | |
| 74 return; | |
| 75 } | |
| 76 | |
| 77 if (!request_context_getter_.get()) { | |
| 78 DVLOG(1) << "Missing request context getter"; | |
| 79 AllDone(false); | |
| 80 return; | |
| 81 } | |
| 82 | |
| 83 net::NetworkTrafficAnnotationTag traffic_annotation = | |
| 84 net::DefineNetworkTrafficAnnotation("safe_browsing_cache_collector", R"( | |
| 85 semantics { | |
| 86 sender: "Threat Details Cache Collector" | |
| 87 description: | |
| 88 "This request fetches different items from safe browsing cache " | |
| 89 "and DOES NOT make an actual network request." | |
| 90 trigger: | |
| 91 "When safe browsing extended report is collecting data." | |
| 92 data: | |
| 93 "None" | |
| 94 destination: OTHER | |
| 95 } | |
| 96 policy { | |
| 97 cookies_allowed: false | |
| 98 setting: | |
| 99 "Users can enable or disable this feature by stopping sending " | |
| 100 "security incident reports to Google via disabling 'Automatically " | |
| 101 "report details of possible security incdients to Google.' in " | |
| 102 "Chrome's settings under Advanced Settings, Privacy. The feature " | |
| 103 "is disabled by default." | |
| 104 chrome_policy { | |
| 105 SafeBrowsingExtendedReportingOptInAllowed { | |
| 106 policy_options {mode: MANDATORY} | |
| 107 SafeBrowsingExtendedReportingOptInAllowed: false | |
| 108 } | |
| 109 } | |
| 110 })"); | |
| 111 | |
| 112 current_fetch_ = | |
| 113 net::URLFetcher::Create(GURL(resources_it_->first), net::URLFetcher::GET, | |
| 114 this, traffic_annotation); | |
| 115 data_use_measurement::DataUseUserData::AttachToFetcher( | |
| 116 current_fetch_.get(), | |
| 117 data_use_measurement::DataUseUserData::SAFE_BROWSING); | |
| 118 current_fetch_->SetRequestContext(request_context_getter_.get()); | |
| 119 // Only from cache, and don't save cookies. | |
| 120 current_fetch_->SetLoadFlags(net::LOAD_ONLY_FROM_CACHE | | |
| 121 net::LOAD_SKIP_CACHE_VALIDATION | | |
| 122 net::LOAD_DO_NOT_SAVE_COOKIES); | |
| 123 current_fetch_->SetAutomaticallyRetryOn5xx(false); // No retries. | |
| 124 current_fetch_->Start(); // OnURLFetchComplete will be called when done. | |
| 125 } | |
| 126 | |
| 127 ClientSafeBrowsingReportRequest::Resource* | |
| 128 ThreatDetailsCacheCollector::GetResource(const GURL& url) { | |
| 129 ResourceMap::iterator it = resources_->find(url.spec()); | |
| 130 if (it != resources_->end()) { | |
| 131 return it->second.get(); | |
| 132 } | |
| 133 return NULL; | |
| 134 } | |
| 135 | |
| 136 void ThreatDetailsCacheCollector::OnURLFetchComplete( | |
| 137 const net::URLFetcher* source) { | |
| 138 DVLOG(1) << "OnUrlFetchComplete"; | |
| 139 DCHECK_CURRENTLY_ON(BrowserThread::IO); | |
| 140 DCHECK(current_fetch_.get()); | |
| 141 if (source->GetStatus().status() != net::URLRequestStatus::SUCCESS && | |
| 142 source->GetStatus().error() == net::ERR_CACHE_MISS) { | |
| 143 // Cache miss, skip this resource. | |
| 144 DVLOG(1) << "Cache miss for url: " << source->GetURL(); | |
| 145 AdvanceEntry(); | |
| 146 return; | |
| 147 } | |
| 148 | |
| 149 if (source->GetStatus().status() != net::URLRequestStatus::SUCCESS) { | |
| 150 // Some other error occurred, e.g. the request could have been cancelled. | |
| 151 DVLOG(1) << "Unsuccessful fetch: " << source->GetURL(); | |
| 152 AdvanceEntry(); | |
| 153 return; | |
| 154 } | |
| 155 | |
| 156 // Set the response headers and body to the right resource, which | |
| 157 // might not be the same as the one we asked for. | |
| 158 // For redirects, resources_it_->first != url.spec(). | |
| 159 ClientSafeBrowsingReportRequest::Resource* resource = | |
| 160 GetResource(source->GetURL()); | |
| 161 if (!resource) { | |
| 162 DVLOG(1) << "Cannot find resource for url:" << source->GetURL(); | |
| 163 AdvanceEntry(); | |
| 164 return; | |
| 165 } | |
| 166 | |
| 167 ReadResponse(resource, source); | |
| 168 std::string data; | |
| 169 source->GetResponseAsString(&data); | |
| 170 ReadData(resource, data); | |
| 171 AdvanceEntry(); | |
| 172 } | |
| 173 | |
| 174 void ThreatDetailsCacheCollector::ReadResponse( | |
| 175 ClientSafeBrowsingReportRequest::Resource* pb_resource, | |
| 176 const net::URLFetcher* source) { | |
| 177 DVLOG(1) << "ReadResponse"; | |
| 178 DCHECK_CURRENTLY_ON(BrowserThread::IO); | |
| 179 net::HttpResponseHeaders* headers = source->GetResponseHeaders(); | |
| 180 if (!headers) { | |
| 181 DVLOG(1) << "Missing response headers."; | |
| 182 return; | |
| 183 } | |
| 184 | |
| 185 ClientSafeBrowsingReportRequest::HTTPResponse* pb_response = | |
| 186 pb_resource->mutable_response(); | |
| 187 pb_response->mutable_firstline()->set_code(headers->response_code()); | |
| 188 size_t iter = 0; | |
| 189 std::string name, value; | |
| 190 while (headers->EnumerateHeaderLines(&iter, &name, &value)) { | |
| 191 ClientSafeBrowsingReportRequest::HTTPHeader* pb_header = | |
| 192 pb_response->add_headers(); | |
| 193 pb_header->set_name(name); | |
| 194 // Strip any Set-Cookie headers. | |
| 195 if (base::LowerCaseEqualsASCII(name, "set-cookie")) { | |
| 196 pb_header->set_value(""); | |
| 197 } else { | |
| 198 pb_header->set_value(value); | |
| 199 } | |
| 200 } | |
| 201 | |
| 202 if (!source->WasFetchedViaProxy()) { | |
| 203 pb_response->set_remote_ip(source->GetSocketAddress().ToString()); | |
| 204 } | |
| 205 } | |
| 206 | |
| 207 void ThreatDetailsCacheCollector::ReadData( | |
| 208 ClientSafeBrowsingReportRequest::Resource* pb_resource, | |
| 209 const std::string& data) { | |
| 210 DVLOG(1) << "ReadData"; | |
| 211 DCHECK_CURRENTLY_ON(BrowserThread::IO); | |
| 212 ClientSafeBrowsingReportRequest::HTTPResponse* pb_response = | |
| 213 pb_resource->mutable_response(); | |
| 214 if (data.size() <= kMaxBodySizeBytes) { // Only send small bodies for now. | |
| 215 pb_response->set_body(data); | |
| 216 } | |
| 217 pb_response->set_bodylength(data.size()); | |
| 218 pb_response->set_bodydigest(base::MD5String(data)); | |
| 219 } | |
| 220 | |
| 221 void ThreatDetailsCacheCollector::AdvanceEntry() { | |
| 222 DVLOG(1) << "AdvanceEntry"; | |
| 223 DCHECK_CURRENTLY_ON(BrowserThread::IO); | |
| 224 // Advance to the next resource. | |
| 225 ++resources_it_; | |
| 226 current_fetch_.reset(NULL); | |
| 227 | |
| 228 // Create a task so we don't take over the IO thread for too long. | |
| 229 BrowserThread::PostTask( | |
| 230 BrowserThread::IO, FROM_HERE, | |
| 231 base::BindOnce(&ThreatDetailsCacheCollector::OpenEntry, this)); | |
| 232 } | |
| 233 | |
| 234 void ThreatDetailsCacheCollector::AllDone(bool success) { | |
| 235 DVLOG(1) << "AllDone"; | |
| 236 DCHECK_CURRENTLY_ON(BrowserThread::IO); | |
| 237 *result_ = success; | |
| 238 BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, callback_); | |
| 239 callback_.Reset(); | |
| 240 } | |
| 241 | |
| 242 } // namespace safe_browsing | |
| OLD | NEW |